Dr WeiQi Yan received his Ph.D. degree from Institute of Computing Technology, Academia Sinica, China in 2001. His research interests include Multimedia Systems and Intelligent Multimedia Security, Forensics and Surveillance. He has over 90 publications. Dr Yan is serving as an associate editor for th...

Dr WeiQi Yan received his Ph.D. degree from Institute of Computing Technology, Academia Sinica, China in 2001. His research interests include Multimedia Systems and Intelligent Multimedia Security, Forensics and Surveillance. He has over 90 publications. Dr Yan is serving as an associate editor for th...

This introductory text covers media security, starting off by highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding. A brief history of digital watermarking is presented which includes examples of fragile and robust techniques. Digital scrambling of images and audio is examined. Digital video surveillance in addition to multimedia authentication and forensics is discussed, this includes image, video and document authentication including biometrics.

Introduction

Overview

Research Areas of Media Security

Criteria for Media Evaluation

Mathematical Models for Information Hiding

Theoretical Security Model for Information Hiding

Summary

Steganography

Overview

Stego Algorithms

Detecting Information Hiding

Bit Operation Based Information Hiding

Mutual Multimedia Information Hiding

Summary

Digital Watermarking

Overview

Watermarking History

Video Watermarking

Video Logo Erasing

Logo Removal using Video Inpainting

Summary

Digital Scrambling

Overview

Digital Image Scrambling

Audio Scrambling

Summary

Digital Surveillance

Overview

Adaptive Video Monitoring

Video surveillance using multiple cameras

Multimedia Simplification for Video Monitoring

Summary

Digital Multimedia Authentication and Forensics

Video Authentication

Printed Document Authentication

Document Authentication with RSE

Passive Image Authentication: Passive-Blind Image Forensics (PBIF)

Multimedia Forensics

Summary

Bibliography

Great Book, very helpful. It has every fundamental someone may need for media security

11 februari 2014

Diane K. Clark

Very education. The public can greatly benefit from this for awareness' sake.